Network Security Fundamentals
From Threats to Protections, Encryption, and Law
August 15, 2025
Network Security Fundamentals August 15, 2025 1 / 23
Outline
1 Security Overview
2 Forms of Attack
3 Protection and Cures
4 Encryption
5 Legal Approaches
Network Security Fundamentals August 15, 2025 2 / 23
Security Overview
Why Security Matters
▶ Networked computers face risks of unauthorized access and vandalism.
▶ Attacks may deploy malware locally or act remotely over the network.
▶ Goals vary: disruption (e.g., DoS) or data theft and misuse.
Network Security Fundamentals August 15, 2025 3 / 23
Forms of Attack
Malware: Key Categories
▶ Viruses: insert into host programs; execute with host; may replicate or corrupt OS/data.
▶ Worms: self-propagate over networks; replication can overwhelm hosts and networks.
▶ Trojan Horses: appear beneficial; execute hidden harmful actions, sometimes on a
trigger.
▶ Spyware (”sniffing software”): silently collects and exfiltrates user/system activity.
Network Security Fundamentals August 15, 2025 4 / 23
Forms of Attack
Social Engineering Vector: Phishing
▶ Phishing: asking victims directly for sensitive data under false pretenses.
▶ Often via email impersonating banks, agencies, or law enforcement.
▶ Harvests passwords, credit card numbers, and other credentials.
Network Security Fundamentals August 15, 2025 5 / 23
Forms of Attack
Remote Attacks: Denial of Service (DoS)
▶ DoS: flood a target with messages to disrupt legitimate service.
▶ Botnets: attacker-controlled fleets of compromised machines launch the flood on signal.
▶ Availability of unprotected PCs fuels DoS capacity.
Network Security Fundamentals August 15, 2025 6 / 23
Forms of Attack
Spam and Related Risks
▶ Spam: unsolicited bulk email; overloads the user rather than systems.
▶ Common vehicle for phishing, Trojans, and virus distribution.
Network Security Fundamentals August 15, 2025 7 / 23
Protection and Cures
Firewalls
▶ Filter traffic at network gateways or on individual hosts.
▶ Block known-bad sources; restrict unneeded services/ports.
▶ Help terminate DoS by blocking attacking origins.
▶ Prevent spoofing: block inbound messages falsely claiming internal origins.
Network Security Fundamentals August 15, 2025 8 / 23
Protection and Cures
Spam Filters
▶ Specialized firewalls for email; distinguish spam vs. legitimate messages.
▶ Often use learning/training to improve accuracy (e.g., probabilistic/AI methods).
Network Security Fundamentals August 15, 2025 9 / 23
Protection and Cures
Proxy Servers
▶ Intermediary between client and server (FTP, HTTP, Telnet, etc.).
▶ Hides internal clients from external servers; reduces leakage of intranet structure.
▶ Can inspect/filter server responses (e.g., scan incoming files for known viruses).
Network Security Fundamentals August 15, 2025 10 / 23
Protection and Cures
Auditing and Monitoring
▶ Track traffic volumes and patterns; monitor firewall activity.
▶ Detect irregularities early; primary tool for admins to contain issues.
Network Security Fundamentals August 15, 2025 11 / 23
Protection and Cures
Antivirus and Safe Practices
▶ Use antivirus/anti-spyware tools; keep signatures and engines up to date.
▶ Exercise caution: avoid unknown attachments, unverified downloads, and pop-ups.
▶ Disconnect from the Internet when not necessary to reduce exposure.
Network Security Fundamentals August 15, 2025 12 / 23
Encryption
Why Encrypt?
▶ Passwords control access, but in-transit data may traverse untrusted intermediaries.
▶ Encryption preserves confidentiality even if messages are intercepted.
▶ Many applications provide secure versions (e.g., HTTPS).
Network Security Fundamentals August 15, 2025 13 / 23
Encryption
HTTPS and SSL
▶ HTTPS: secure HTTP used by financial and other sensitive services.
▶ Built on Secure Sockets Layer (SSL) protocols to protect client-server links.
▶ Browsers indicate secure sessions (e.g., padlock icon).
Network Security Fundamentals August 15, 2025 14 / 23
Encryption
Public-Key Encryption (PKE)
▶ Two keys: public key (encrypt) and private key (decrypt).
▶ Anyone can encrypt to the holder; only the private-key holder can decrypt.
▶ Intermediaries knowing the public key still cannot decrypt.
Network Security Fundamentals August 15, 2025 15 / 23
Encryption
Key Authenticity and Certificates
▶ Risk: spoofed public keys (impersonation of a bank, etc.).
▶ Certificate Authorities (CAs) provide certificates: bind identities to public keys.
▶ Organizations may operate internal CAs for tighter control.
Network Security Fundamentals August 15, 2025 16 / 23
Encryption
Digital Signatures
▶ Some PKE schemes allow encrypting with the private key to produce a signature.
▶ Verification with the public key assures authenticity of the signer.
▶ A signature can be the encrypted form of the message (or a digest).
Network Security Fundamentals August 15, 2025 17 / 23
Legal Approaches
Limits of Legal Remedies
▶ Illegality provides recourse, not prevention.
▶ Internet is international: jurisdictional complexity hinders enforcement.
▶ International bodies (e.g., courts) may be needed for cross-border cases.
Network Security Fundamentals August 15, 2025 18 / 23
Legal Approaches
Key U.S. Laws and Issues
▶ Computer Fraud and Abuse Act (CFAA): prosecutes worms/viruses, unauthorized
access, theft of value.
▶ Electronic Communications Privacy Act (ECPA): protects privacy; limits interception
and provider disclosure.
▶ Employer monitoring often hinges on authorization when using employer equipment.
Network Security Fundamentals August 15, 2025 19 / 23
Legal Approaches
Government Monitoring and Controversies
▶ Agency monitoring under restrictions; debates over scope and oversight.
▶ Examples: FBI Carnivore (2000); USA PATRIOT Act (2001); later revelations of bulk
data collection (2013).
▶ CALEA: mandates telecom capabilities for lawful intercept—complex and costly to
implement.
Network Security Fundamentals August 15, 2025 20 / 23
Legal Approaches
Encryption vs. Monitoring
▶ Strong encryption limits the value of intercepted data to law enforcement.
▶ Proposals for key registration/escrow raise corporate privacy and security concerns.
▶ Central question: How secure can key registration be?
Network Security Fundamentals August 15, 2025 21 / 23
Legal Approaches
Cybersquatting and Domain Names
▶ Anticybersquatting Consumer Protection Act (1999): protects against confusingly
similar domain names.
▶ Does not ban domain speculation, but restricts trademark-impersonating names.
▶ Example: generic names (e.g., GreatUsedCars.com) vs. protected business names.
Network Security Fundamentals August 15, 2025 22 / 23
Summary
Takeaways
▶ Threats span malware, social engineering, and network-level attacks.
▶ Defense-in-depth: firewalls, proxies, spam filters, auditing, antivirus, and safe user
behavior.
▶ Encryption (HTTPS, PKE, certificates, signatures) safeguards confidentiality and
authenticity.
▶ Legal frameworks aid deterrence and recourse, but technical controls remain essential.
Network Security Fundamentals August 15, 2025 23 / 23